NSA Reportedly Confident North Korea Was Behind WannaCry

But some say no evidence exists to unequivocally pin blame for attacks on Pyongyang.

The US National Security Agency (NSA) appears to have joined the ranks of those convinced that the North Korean government was behind the recent WannaCry ransomware epidemic even as many others remain skeptical of that conclusion.

The Washington Post Wednesday reported that NSA officials have determined with "moderate confidence" that the tactics and techniques used in the WannaCry attacks point to the Reconnaissance General Bureau, the North Korean intelligence agency. The motive for the attacks apparently was to try and raise money in the form of ransom payments from victims, the Washington Post said, citing sources within the NSA.

The NSA's assessment of WannaCry concludes that threat actors sponsored by the North Korean intelligence agency created two versions of WannaCry.

News of the NSA's reported analysis coincides with a somewhat oddly timed released this week of a US-CERT technical analysis linking the North Korean government to a botnet used to launch DDoS attacks worldwide.

Together, the developments suggest that the US government could be making a case for some sort of retaliatory action against the North Korean government for its alleged misbehavior in cyberspace, though it is too early to know for sure. Such a move would certainly jibe with the Trump Administration's overall get-tough stance against Pyongyang over the isolated nation's controversial missile program.

The US government's apparent conclusions about its origins have at least some measure of support within the security industry. At a Congressional hearing Thursday on the lessons learned from the WannaCry outbreak, a senior executive from Symantec reiterated statements the company has made previously about its belief that North Korea had a hand in the attacks.

"There were very, very close similarities to other kinds of attacks we have seen, specifically attacks we attribute to a group called Lazarus," said Hugh Thompson in his testimony before the Joint Subcommittee on Oversight and Subcommittee on Research and Technology hearing.

"The malware, the reuse of strings in that malware the reuse of command and control infrastructure out on the Internet by that malware led our researchers to believe there is a strong link to the Lazarus group," which the FBI has linked to North Korea, he said. The same group was linked to the attacks on Sony and to the more than $81 million cyberheist from the Bank of Bangladesh last year, he said.

Other security experts are less sure of the connection and say there's not enough evidence available to unequivocally attribute the attacks to North Korea.

"We think it is ambiguous to conjecture over the origins of WannaCry," Salim Neino, chief executive officer of Kryptos Logic, said in his testimony at the hearing. Some of the pieces of code used in the WannaCry attacks suggest that a nation-state actor was involved. According to Neino, WannaCry may have impacted as many as 2 million systems worldwide, which is considerably more than previous estimates.

"But unfortunately, anyone could have created this level of attack," and then made it look like North Korea was behind it, he said. "I would compare it perhaps to photo-shopping a program to make it look a certain way. Or, it could have simply been what it is. What I can say is these attacks are very difficult to attribute," he noted.

Others have suggested that the authors of WannaCry have a Chinese connection. Security vendor FlashPoint, for instance, says its linguistic analysis of the 28 ransomware messages used in the WannaCry attacks suggest the authors are from China or are Chinese-speaking.

"Many researchers have linked the WannaCry malware to the “Lazarus Group,” which is itself believed affiliated with North Korea," FlashPoint said in a separate intelligence report earlier this month. "Flashpoint’s own analysis of the 28 odd foreign language ransom notes, however, strongly suggests a Chinese-speaking author of the notes themselves," the note said. "These two findings—the link to North Korea and a Chinese-speaking author of the ransom notes—are not mutually exclusive, however," the company added.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.

Published: 2017-05-09NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.